ID CVE-2007-3765
Summary The STUN implementation in Asterisk 1.4.x before 1.4.8, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted STUN length attribute in a STUN packet sent on an RTP port.
References
Vulnerable Configurations
  • cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*
    cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*
  • cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*
    cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*
  • cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 29-07-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 24950
confirm http://ftp.digium.com/pub/asa/ASA-2007-017.pdf
sectrack 1018407
secunia 26099
vupen ADV-2007-2563
xf asterisk-stun-dos(35480)
Last major update 29-07-2017 - 01:32
Published 18-07-2007 - 17:30
Last modified 29-07-2017 - 01:32
Back to Top